Which port numbers are used by TCP and UDP to set up
sessions with
other
hosts?
A.) 1024 and above
B.) 6 and 17 respectively
C.) 1-25
D.) 6-17
Answers were Sorted based on User's Feedback
Answer / naveen malik
answer is b. that is 6 for tcp and 17 for udp.
| Is This Answer Correct ? | 2 Yes | 1 No |
Define class full protocol?
At which layer of the OSI model does the ping command operate? A. session B. network C. transport D. maintenance
12 Answers EF, IBM, jetking, Nexlinx, Rkd, TCS, Wipro,
Hi Guys.. I hv a confusion in my mind. Plz help me to clear my concept. How a port respond when a PortFast port receives any BPDU. Please make sure that BPDU Guard, ROOT Guard are not considered in this scenario. Just a spanning tree without any enhancement. Will the port goes through STP port state??? As we knw that PortFast bypass the Listening & Learning State? How it will respond when a BPDU (Inferior or Superior) is received on that Port. Thanks in advance. Waiting for Replay.
To monitor ipx traffic on a network, what command would you use? A. debug ipx transaction B. show ipx traffic C. show ipx events D. display ipx traffic
What is the meaning of synchronization?
Can Anybody tell me if I wanna block all MP3,video sites from cisco 2600 router,how shall i proceed with ACL's?? Please post the steps for the following alonge with detail. Thanks to you all ..appriciated
Select the most correct statement regarding client port address assignment. The client port always matches the destination port. To access a web page the client uses the source port of 80 and the destination port is dynamically selected. When a client requests a web page the destination port is 80 by default and the source port for the client is dynamically selected. The client source port is 1024 to get web pages and 1055 when retrieving ftp files.
Explain how many maximum paths you can give on latest ios in rip?
You have a Class B network address divided into 30 subnets. You will add 25 new subnets within the next year. You need 600 host IDs for each subnet. Which subnet mask should you use? A.) 255.254.0.0 B.) 255.192.0.0 C.) 255.255.252.0 D.) 255.255.248 0
What are four benefits that can result from applying ISDN networking? (Choose four) A. Full time connectivity across the ISDN is spoofed by Cisco IOS routers using dial on demand routing (DDR) B. Small Once and Home Once sites can be economically supported with ISDN Basic Rate Interface (BRI) servkps C. ISDN replaces Signaling System 7 (SS7) in the Public Switched Telephone Network (PSTIC) backbone D. ISDN can be used as a backup service for a leased line connection between the remote and central chaps E. Modem racking and cabling can be eliminated by integration of digital modem cards on Cisco IOS Network Acess Servers (NAS)
Your PC has been configured with IP Address 192.168.3.25 and a subnet mask of 255.255.255.0. Which of the following IP Addresses is a valid default gateway address for your PC? 192.168.3.0 255.255.255.0 192.168.3.2 255.255.255.0 192.168.3.25 255.255.255.0 192.168.4.1 255.255.255.255
What is the maximum hop count for Link-State protocols? A.) 15 B.) there is no hop count limit C.) 256 D.) 16